A Verification Method for Security and Safety of IoT Applications through DSM Language and Lustre

Wentao Tang, Hao Feng, Kenji Hisazumi, Akira Fukuda

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Development of Internet of Things (IoT) brings a variety of IoT applications that involve housing, navigation, payment, and healthcare. Since IoT applications play an important role in our lives, security is critical to these applications and must be guaranteed. In order to realize this, the paper proposes a pre-execution verification method for downloaded IoT applications, which meets security and safety requirements of users using model checking. The model checking requires special models for verification, which is difficult to describe for developers. So we introduce a domain-specific modeling language (DSML) to describe IoT application and a generator from the DSML into the model to pre-execution verification and execution. Also, as a case study, we provide a study of our method used in a smart house application, which is one of the most representative examples in IoT applications.

Original languageEnglish
Title of host publicationProceedings of the 2020 3rd International Conference on Information Science and System, ICISS 2020
PublisherAssociation for Computing Machinery
Pages166-170
Number of pages5
ISBN (Electronic)9781450377256
DOIs
Publication statusPublished - Mar 19 2020
Event3rd International Conference on Information Science and System, ICISS 2020 - Virtual, Online, United Kingdom
Duration: Mar 19 2020Mar 22 2020

Publication series

NameACM International Conference Proceeding Series

Conference

Conference3rd International Conference on Information Science and System, ICISS 2020
CountryUnited Kingdom
CityVirtual, Online
Period3/19/203/22/20

All Science Journal Classification (ASJC) codes

  • Human-Computer Interaction
  • Computer Networks and Communications
  • Computer Vision and Pattern Recognition
  • Software

Fingerprint Dive into the research topics of 'A Verification Method for Security and Safety of IoT Applications through DSM Language and Lustre'. Together they form a unique fingerprint.

Cite this